Tuesday, August 18, 2015

Computer Chrime - Current Practices, Problems and Proposed So


                                   









 Computer Crime:

  Current Practices, Problems and Proposed Solutions

          Second Draft   Brian J. Peretti

               It would have been surprising if there had been satisfactory
          road traffic legislation before  the invention of the  wheel, but
          it would also have been surprising  if the law on the passage  of
          laden  donkeys  proved  entirely  satisfactory  when  applied  to
          vehicles.1


          I.  Introduction
               Within   recent   years,   computer  crime   has   become  a
          preoccupation with law  enforcement officials.  In  California, a
          group of  West German  hackers2 using  phone lines  and satellite
          hookups, gained  unauthorized access into  civilian and  military
          computers and  stole sensitive documents  that were  sold to  the
          Soviet  Union.3    A  young  New York  programmer  broke  into  a
          Washington computer to  run a program that he could  not run from
          his personal  computer.4  After  Southeastern Bell Stated  that a
          document  published in an  electronic publication5 was  valued at
          more than $75,000 the publisher was arrested and brought to trial
          before the discovery that  the document could be publicly  bought
          from the company  for $12.6  The Chaos Computer  Club, a Hamburg,
          Germany,  club,  went   into  government  computers   and  access
          information and gave it to reporters.7  In May,  1988, the United
          States government launched Operation Sun Devil, which lead to the
          seizure  of  23,000   computer  disks  and  40  computers.8    In
          addition,  poor police  performance9  has  also  been  blamed  on
          computers.
               Since  its  creation,  the computer  has  become  increasing
          important in society.10   The law, as  in the past, has  not been
          able   to  evolve   as   quickly   as   the   rapidly   expanding
          technology.11  This  lack of movement on the  part of governments
          shows a lack  of understanding with the area.  The need to create
          a  comprehensive  regulation   or  code  of  ethics   has  become
          increasing necessary.
               Due   to  the   nature  of   computer   systems  and   their
          transnational   connections   through   telephone   lines12,   an
          individual  state's action will only stop the problems associated
          with computer crime if many  states join together.  The patchwork
          of  legislation that  exists  covers  only a  small  part of  the
          problem.  To  adequately address computer crime,  greater efforts
          must   be  made  within  the  computer  community  to  discourage
          unauthorized computer access, countries must strengthen and
             co-ordinated  their computer related  laws, as well  as proper
          enforcement mechanism created, computer program copyright laws be
          enhanced  and computer systems  should be created  to allow those
          who wish to  explore computer systems which will  not disrupt the
          users of computer systems.
               This paper will first set out a definition of computer crime
          and  why laws  or regulation  by the  computer community  must be
          created.   Section  II will  then discuss  the United  States law
          concerning  computer crime and  why it needs  to be strengthened.
          Section  III will  discuss the  proposed  Israeli computer  crime
          bill, Britain's  Computer Misuse  Act and  Ghana's proposed  law.
          Section IV will  discuss what can be done by  both the government
          and  computer  owners  and  users  to  make  computer  crime less
          possible.


          II.  Computer crime

               The definition of what constitutes a computer crime has been
          the  subject of  much controversy.    A computer  crime has  been
          defined as  "any  illegal act  for  which knowledge  of  computer
          technology  is  used  to  commit  an  offense."13    The  typical
          computer criminal has  been described as between 15  and 45 years
          old, usually male, no previous contact with law enforcement, goes
          after both government and business, bright, motivated, fears loss
          of status  in computer community  and views his acts  as games.14
          For the  purposes of  this article, this  will be  the definition
          used because of its broad reach.

               Estimates regarding how much is lost to computer  crime very
          widely15.   In  the only  authoritative  study, the  loss due  to
          computer crime  was given  at $555,000,000,  930 personnel  years
          lost  and 153 computer  time years lost.16   The  amount of total
          incidents for  1988 was 485  resulting in 31 prosecutions17.   In
          1987,  there were 335  incidents with 8  prosecutions.18 Security
          spent   on  prevention  of   computer  crime  is   becoming  more
          commonplace19.

               The   most  publicized   danger  to  computer   systems  are
          viruses20  and worms.    A virus  is a  code segment  which, when
          executed,  replicates  itself   and  infects  another  program.21
          These  viruses may  be created  anywhere in  the world22  and may
          attack anything.23   A virus may be transmitted  through a trojan
          horse24  program.  A  worm exists as  a program in  its own right
          and  may spread over  a network via  electronic mail25.   A virus
          attacks a program while  a worm attacks the computer's  operating
          system.26      The  most  notorious  computer  worm  brought  the
          Internet computer network to a halt.27

               Computer  virus attacks  may  be overrated.28    It is  said
          that the  biggest threat  to computing includes  "not backing  up
          your  data, not  learning the  ins and  outs of  your application
          programs,  not  putting  enough  memory  in  your  computer,  not
          organizing your  hard  disk, [and]  not upgrading  to the  latest
          version of  your applications.29   These  computer programs  have
          been compared  to the AIDS virus.30   One author has  stated that
          the  viruses are used  to both increase the  amount of profits of
          computer program producers and anti-virus computer programs.31

               Computer  viruses may  also  be  used  to  benefit  computer
          systems,  by either  detecting  flaws  in  security  measures  or
          detecting other  viruses.32   Virus are  very dangerous,  though.
          The effects of a virus called Datacrime, activated on October 13,
          1989, brought  down 35,000  personal computers  within the  Swiss
          government and several companies in Holland.33

               With the opening up of  Eastern Europe, the virus problem is
          expected to  increase.34  In  Bulgaria, a country which  does not
          have any laws  against computer  viruses, one  new virus  appears
          week.35   Computer  viruses  are created  in  countries like  the
          Soviet Union  as a way to punish  computer pirates because of the
          lack of copyright laws.36

               Perhaps  the most dangerous  threat to information contained
          in a  computer is  the "leakage" of  radiation from  the computer
          monitors.37   With inexpensive  equipment38 a  person can  "read"
          the information  off the computer  screen and then  replicate the
          information  from the screen in a readable manner.39
               The threat of attack on a computer system can also come from
          a  hacker.   A  hacker  is  a  person  who breaks  into,  whether
          maliciously  or not, computers  or computer systems.40   A hacker
          can, if the system is not adequately secured, cause havoc  in the
          computer  by either  deleting  or altering  programs  or data  or
          planting  logic  bombs  or  viruses  in  the  computer  system.41
          Threats  from hackers  to plant  viruses  have been  made in  the
          past.42  The  threat from computer hackers, as  with viruses, has
          been said to be overrated.43
               The issues surrounding computers still have not been decided
          by those within  the computer community.  Whether  or not persons
          should  be   allowed   to   access   computer   systems   without
          authorization  is still a subject  of debate within the computing
          community.    A West  German  Computing  Club, called  The  Chaos
          Computing Club, holds the belief that it is not improper to enter
          any system  which they can  gain access to  and to "look"  around
          inside of  the  system as  much as  they wish.44    They do  not,
          however,  condone destroying or  altering any of  the information
          within  the  system.45      On the  other  side,  represented  by
          Clifford Stoll, when individuals break into computer systems they
          disrupt the trust  that the computer system is  based on.46  This
          breach of trust  not only makes operating the  system tougher for
          the manager in control  of the system, but also will decrease the
          amount  of  use  of  the  system  so  less  information  will  be
          transferred within the system.47
               There is also conflicting views as to whether the authors of
          computer  viruses should  be punished.    Marc Rotenberg48  holds
          the  belief  that  a  virus  should be  granted  first  amendment
          protection  in some  instances.49   In  response to  the Internet
          worm, there were 21 editorials that stated that the attack showed
          the  need for  more security  in  computers while  there were  10
          letters  to  editors  that  stated that  the  creator  should  be
          applauded rather  then punished.50   They argue  that this  was a
          good way to  raise consciousness concerning computer  security.51
          Alan Solomon, a consultant who specializes in virus detection and
          eradication,   believes   that   viruses   are,   at   most,   an
          inconvenience.52

          III.United States Computer Legislation

               The  United  States  government53  and  most  states54  have
          computer crime laws.   In 1979, only six states had  such laws.55
          Almost every  computer  crime will,  in addition  to violating  a
          state and/or  federal law,  can  also be  prosecuted under  other
          laws.56

               A.   Computer Fraud and Abuse Act.
               Congress originally  enacted the  Counterfeit Access  Device
          and  Computer Fraud and  Abuse Act57   to address  the problem of
          computer crime.  Understanding that the scope of the original law
          was  too narrow,58  in 1986  Congress enacted  amendments  to the
          Computer Fraud  and Misuse  Act of 1984.59   The  Act essentially
          lists  acts that if  done with a  computer are illegal.   The Act
          also  makes individuals  culpable  for  attempting  to  commit  a
          computer crime.60
               In order to commit any  of the crimes mentioned in  the act,
          the actor must  have acted either "intentionally"  or "knowingly"
          when committing  the act.   The law  addresses national  security
          issues  by making a  crime of anyone  using a  computer to obtain
          information and  giving the  information to  foreign countries.61
          The penalty  for this crime  or its attempt  is 10 years  for the
          first offense62  and 20  years for subsequent  offenses63.   If a
          person   intentionally   accesses  a   computer   either  without
          authorization or in excess  of his authorization and obtains  and
          acquires information in  a financial record of  an institution or
          information contained in  a financial record of  an individual64,
          the person  will  have  committed  a misdemeanor  for  the  first
          offense65 and  a  felony for  subsequent  offenses66.   A  person
          intentionally   accessing    a   government    computer   without
          authorization  which  affects  the   government's  use  of   that
          computer67  will have  committed  a  misdemeanor  for  the  first
          offense68 and  a felony  for the second  offense.69   Accessing a
          computer with  knowledge and  intent to  defraud  and without  or
          exceeding authority is a crime  if the person obtains anything of
          value  other  than  use  is  a felony70.    Accessing  a  federal
          interest computer  without  authorization  and  either  modifying
          medical records or causing $1,000  or more worth of damage within
          a one year  period71 is  punishable with  up to 5  years for  the
          first offense72 and 10 years for any subsequent offense.73
               The Act  also criminalizes  trafficking in  passwords.74   A
          person  who knowingly  and with intent  to defraud  traffics75 in
          passwords or similar  information may be sentenced for  up to one
          year  for the first offense76  and up to  10 years for subsequent
          offenses77 if the  computer is used by  or for the  Government of
          the   United   States78   or   affects   interstate  or   foreign
          commerce.79

               B.   Criticisms
               It is  important to note  that this statute only  applies to
          "Federal interest computers"  as defined by  this section.80   If
          a computer is  not this type of  computer, then any of  the above
          mentioned crimes  will not  be prosecutable  under this  section.
          Congress  intentionally  made the  scope  of the  law  narrow.81
          This  section  has  been criticized  as  not  inclusive enough.82
          Individual and  corporate computers  which do not  fall into  the
          restrictive  definition83 may not  receive the protection  of the
          statute.
               The  problem  of  computer  viruses  are  not  addressed  by
          Act.84  The act  does not punish  those who add information  into
          a computer, even though this may do more harm then just accessing
          information.   The Congress has  attempted to address  this issue
          under two bills85, but neither one has been enacted.
               Unauthorized access where there is no theft or damage to the
          system  is  not  covered.86    For example,  a  person  access  a
          computer  system and looks  at information contained  therein, he
          has not committed a punishable crime under the Act.87
               Questions have also been brought  up concerning many of  the
          undefined terms  within the Act.88  Terms  such as "intentionally
          access" and "affects interstate commerce" are among the terms not

          defined.89   The  need to  clarify  these terms  is important  so
          that an individual will know what action will constitute a crime.


          IV.  Legislation From Around The World
               A.   Israel Proposed Computer Law
               In March 1987, the Israeli Ministry of Justice distributed a
          draft of  a comprehensive  computer bill.90   This bill  covers a
          wide range of  areas concerning computers91.  The  Act first sets
          out  a  list  of  proposed  definitions  for  computer,  program,
          software,  information,  thing and  act.   Each  of  these, while
          short, are concise and attempt  to give a brief but comprehensive
          definition.92
               Chapter 2 sets  out a list of offenses  which, if committed,
          are punishable.93   A authorized  person commits an act  upon any
          computer and knows that the  act will prevent or cause disruption
          of   the   proper   operation   is   subject   to   seven   years
          imprisonment.94   A  person who,  without  authority, commits  an
          act  which precludes  a person  from using  a computer  system or
          deprives a person  of using that  system is  punishable by up  to
          seven years  imprisonment.95  If  a person  prepares or  delivers
          or  operates  software  knowing that  the  software  will produce
          faulty results  and "having  reasonable grounds  to assume",  the
          person  is punishable  for up  to seven  years.96   The  Act also
          addresses those who supply, deliver  or  operates a computer with
          faulty data.97
               Section 5 applies to those who use a computer to  attempt to
          obtain  some "thing"98  or  with  intent  prevents  another  from
          obtaining some "thing".99   A  person who  prevents another  from
          obtaining  a  "thing"  by  the   use  of  software  may  also  be
          punished.100  A  person who deprives a  person of an object  that
          contains  software, data or  information and obtaining  a benefit
          for himself.101   All of  these crimes contain a  prison sentence
          of five years.
               A professional who relies on computer outputs that they know
          which  are false  is also  subject to  punishment.102   The crime
          carries a sentence of five years.103
               This chapter does not apply to  all computers, software data
          or  information.104   It  only applies  to those  computers, data
          or information which  are used, designated to  be used by  or for
          (1) the state  or a corporation that is supplying  service to the
          public105  or   (2)  "business,  industry,   agriculture,  health
          services, or for scientific purposes."106
               Perhaps the most novel provision of this proposed law is the
          section governing the reporting of  the offenses.  Any person who
          is  in  charge  of another  and  has  reason to  believe  that an
          individual has committed an offense under the Act, he must report
          this to police  as soon as possible.107   If the person  does not
          do so, he may be imprisoned for up to one year.
               B.   Analysis
               The Israeli computer  crime bill is more  comprehensive then
          the America bill.  By creating a law which will apply not only to
          government computers, but  also to those of  "business, industry,
          agriculture, health  services  or  for  scientific  purposes,"108
          the  law  essentially  covers all  computers  in  the country.109
          By creating such broad coverage, the law will be able to make the
          users of computers in Israel  more secure in their knowledge that
          their systems are safe.                 B.   Analysis
               The Israeli computer  crime bill is more  comprehensive then
          the America bill.  By creating a law which will apply not only to
          government computers, but  also to those of  "business, industry,
          agriculture,  health  services  or  for scientific  purposes,"110
          the  law  essentially  covers all  computers  in  the country.111
          By creating such broad coverage, the law will be able to make the
          users of computers in Israel  more secure in their knowledge that
          their systems are safe.
               The  most controversial provision in the act is the proposal
          requiring  that individuals that may  know of computer crime must
          report the  crime or  face fines themself.   As  Levenfeld points
          out112,  this  will  mean  that  employers  will have  to  impose
          internal  spy rings  to be  able  to tract  down the  "reasonable
          suspicions" that  individuals have  concerning illegal  activity.
          Shalgi, however, believes  that this is a good  provision in that
          it will allow  computer crime to  come more  to the forefront  so
          that the crime can be more easily combatted.113
               This provision is necessary for the government to understand
          exactly how  large of a problem  computer crime is.   At present,
          statistics on computer  crime are difficult to  determine because
          of the  lack of reporting.114   By  making all persons  who would
          be responsible for  computer security, i.e.  all persons who  use
          computer systems, the  problem will be brought into  the open and
          can be addressed.
               The  proposed law  also sets  out  a defense  for those  who
          violate the  law.  Under   11, if a  person who violates  the law
          makes another know that he did disrupt or alter the data, he will
          not be convicted of the crime. This will allow  those who perform
          such acts to avoid  the punishment of  the law.  Individuals  who
          wish to destroy or alter  such information will have an incentive
          to bring forth their mischievous acts so that when brought before
          the  court they  could say  that  they took  precautions so  that
          individuals would  not rely on  the information.   This provision
          will encourage those who do  such activity to come  forth without
          fear of conviction.
               The ability  of a  court to  not impose  a  punishment on  a
          person  is contained  in section  12.115   This allows  the court
          to abstain from  punishment if the offense  is not grave and  was
          not committed with  malice.  This section, in  effect, will allow
          those who commit computer crime to be able to forgo punishment if
          their acts  were not serious.   This will be  beneficial to those
          who  are  hackers in  the  original  sense  of the  word,116  yet
          still allow for punishment of those individuals who enter systems
          to do harm to it.
               The law  also creates  standards for how  a computer  may be
          seized.  Neither  a computer, nor any  part of it, may  be seized
          without a  court order.117   Although  this seems  to  be a  good
          provision in  its effects  on individual  rights118, the  section
          is not focused  enough.  The  law does not  address the issue  of
          whether  a floppy,  as  opposed to  a  hard disk,  is  part of  a
          computer.  The hard disk  is located inside of a  computer, while
          floppy  disks may be removed from the  computer.  This law should
          address this issue by stating that the floppy disk is also a part
          of a computer in its definitions.119
               This section also does not address what standard may be used
          for the  court order.   Must the officer  only have a  reasonable
          suspicion or  probable cause to  seize the computer?   By stating
          explicitly  in the  statute that the  officer must  have probable
          cause to seize the  computer, an overzealous police officer  will
          not be able to as easily seize the computer.

               C.   The Great Britain Computer Misuse Act
               In response  to computer  program concerning  AIDS that  was
          distributed to doctors in Great Britain and Europe that contained
          a  virus,120  Michael   Colvin,  a  British  MP   introduced  the
          Computer  Misuse  Bill.121   On  August  29, 1990,  the  Computer
          Misuse  Act122  came  into  effect.123    It was  estimated  that
          the losses to  British industry and  government were one  billion
          pounds.124     This  Act   is  designed  to   not  to   create  a
          confidential information  right, but  to rather  protect computer
          system integrity125.
               Prior to enactment,  the English Law Commission  studied the
          problem and laws  regarding computer crime. It stated  that there
          should be three new offenses  to deal with computer misuse:   (1)
          Unauthorized access  to a  computer, (2)  Hacking with  intent to
          commit  a serious crime,  and (3)  Intentional destruction  of or
          alteration  to  computer  programs  or  data.126    The  Computer
          Misuse Act states that  unauthorized access occurs if the  person
          is unauthorized to access the computer, he causes the computer to
          perform any function with intent to  gain access to a program  or
          data  in the  computer and  he knows  that this  is the  case.127
          He does not have to be directed to any particular program or data
          in the computer  he attempted to get on or the data or program he
          wishes to  access.128   If a  person commits  unauthorized access
          with   the  intent  to  commit129  or  help  another  offense,130
          the  person can  be sentenced  on summary  conviction, up  to six
          months  in  prison  and  a   fine,131    or  if  convicted  after
          indictment,  to imprisonment  of  up  to five  years,  a fine  or
          both.132
               If a  person modifies  computer material,133  the person  is
          subject  to  a  fine of  up  to  5 years,  an  unlimited  fine or
          both.134   The  person must  knowingly modify  a  program without
          authorization and must have done so with the intent to impair the
          operation of the computer, to prevent or hinder access, or impair
          the  operation  of  the  program  or  resulting  data.135     The
          modification does  not have to  be permanent.136   A modification
          may be done by  either altering, erasing or adding onto a program
          or data.   By stating  modification broadly, the act  attempts to
          combat  the  placing  of  viruses,   worms  and  logic  bombs  on
          computers.137
               The Act  also  extends  the scope  of  jurisdiction.138    A
          person does  not have  to actually  be in  Great  Britain at  the
          commission  of  the crime.    The  crime  itself must  have  some
          relation   to   Great    Britain.139      The   link    must   be
          "significant".140

               D.   Analysis
               As opposed to  the other statutes,  the Computer Misuse  Act
          does not  attempt to define computer.   This was done  because of
          the fear that any definition given for a  computer may become out
          of date  in a  short period  of time.141   Program  and data  are
          also not defined within the Act.
               Great  Britain's courts are granted large jurisdiction.  The
          act allows for anyone who attempt to commit a crime under the act
          to be punished in  Great Britain.  The act, although  setting out
          that  the  link  must  be significant,142  does  not  attempt  to
          define this word.   By this omission, the  Great Britain's courts
          can expand this  to any act that occurs in a foreign country that
          uses  a British computer  for even a  short period of  time.  The
          defining of the word would  clear up some misconceptions that may
          result from the act.
               Of interest  to note, the Act would  not punish a person who
          distributes disks  tat contain  viruses  on them.   Although  the
          drafter of the  bill said that this was his goal, the law ignores
          this possibility.  An amendment should  be added to the law which
          will punish those who damage data even  if they do not access the
          system.

               E.   Ghana
               In response to the belief  that their existing laws were not
          adequate,  a draft  law  was  proposed by  the  Ghana Law  Reform
          Commission.143   The  bill is  rather  simple as  opposed to  the
          other laws.   It has definitions  for access, computer,  computer
          network,  computer program  and  data.144    To  commit  computer
          related  fraud, the  person must  have an  intent to  defraud and
          either alters, damages destroys data or program stored in or used
          by the computer or obtains information to his own advantage or to
          the  disadvantage  of another  or  uses  a  computer commits  and
          offense.145    The  Act  Also  sets  out  alternatives  for  some
          sections that  may be adopted.   The alternative states  that any
          person  who obtains  access to  a  computer program  or data  and
          attempts to erase  or alter  the program or  data with intent  to
          help his  own interests or damage other person's interest commits
          a crime.146
               Damaging computer data occurs  if any person, by  any means,
          without  authority, willfully  does  damage  to  data  commits  a
          crime.147    The crime  of  unauthorized  use  of a  computer  is
          simply  defined as anyone who knowingly without authority commits
          an  offence.148   Similarly, unauthorized  access  is anyone  who
          knowingly gains access  to a computer, network or  any part there
          of, without authority to  do so.149   The Ghana law also  creates
          a crime for the  knowingly and dishonestly introduction of  false
          data  and the  omission to  introduce, record  or store  data.150
          An  authorized  person  who  willfully  or  intentionally  allows
          information to get  into the hands of an  unauthorized person and
          that person uses the information  to his advantage also commits a
          crime.151
               The penalties  for the  crimes are similar  to those  of the
          Great Britain  law.152  On  summary convictions, a jail  term may
          be given of  up to  two years  or the statutory  maximum fine  or
          both.153   On  conviction  on  indictment, a  prison  term of  no
          more  then  ten  years  or an  unlimited  fine,  or  both may  be
          given.154
               The  jurisdiction that the Ghana courts  have in accord with
          this  jurisdiction is as  large as their  British counterpart.155
          The courts can hear  any case if the accused person  was in Ghana
          at the time  of the act.156   Also,  if the program  or data  was
          stored in or  used with a computer  or computer network  in Ghana
          the person may be tried under the law.157

               F.   Analysis
               The Ghana proposed Computer Crime  Law is in accord with the
          United States, Great  Britain and the proposed Israeli  laws.  By
          setting  out  definitions  for  the  various  terms  used in  the
          law158,  the law  clearly defines  which acts  may be  subject to
          prosecution  under the  law.   Although  simple, the  definitions
          attempt to capture  within the law's grasp  the various different
          acts which could be done with a computer that should be outlawed.
               The most  original section  of  the act  concerns the  newly
          created  crime  of   omission  to  introduce,  record   or  store
          data.159   This  section, however,  will end  up punishing  those
          who work in corporations that are at the lowest level skill-wise.
          The government should, if the  law is enacted, force companies to
          give each employee a sufficient  amount of training on a computer
          so that the  person will be  able to act  in accordance with  the
          law.   The act does provide a safeguard by making the mens rea of
          the crime "negligently or dishonestly"160
               The act also sets out  a crime for an individual who  allows
          information  to get  into the  hands of  another.161   As opposed
          to the other laws, this  section specifically address the problem
          of  where  an  authorized  individual  gives  information  to  an
          outsider.  By  specifically regulating this behavior,  anyone who
          wishes to act according will know that the act is illegal.
               The   crime   of    computer-related   fraud   is    defined
          broadly.162    This  law  effectively makes  any  type  of  fraud
          committed either with a computer or information within a computer
          a crime.   The law  adequately addresses the problems  that might
          occur with a computer in fraud.  A broad definition, however, may
          still let some act seem as though they are not covered  since the
          act is not specific in the area of what constitutes a crime.
               Most significantly,  the act does  not state which  types of
          computers are covered  by the act.163   By not giving a  limit on
          which computers are  covered, the act extends its jurisdiction to
          all  "computer"164  and  "computer  network"165 in  the  country.
          If the  definition of  computer changes, due  in part  to advance
          technology, the law may have to change this section.

          V.   Proposed Solutions
               Computer Crime laws  have come a long way  in addressing the
          problem  of  computer  crime.166   The  ability  to regulate  the
          activity will  decrease the amount  of crime  that is  committed.
          Those who use the computers of the world, however, must  not rely
          totally   on  there   respective  governments   to   combat  this
          problem.167
               The best way to combat computer crime is to not let it occur
          at  all.   Many  computer  systems  have  not been  given  enough
          security by  their system  managers.168  It  is possible  to have

          a totally  secure computer system169,  but it is  impractical and
          slows the  free flow  of information.170   By creating  laws that
          will  protect  the  integrity  of  computer  systems  while  also
          allowing for the ability of our best and brightest to develop and
          learn about computer systems will the nation be able to  keep our
          technological lead in the world.
               In order to combat the problem of unauthorized access, users
          of computer systems must be taught to respect each others privacy
          within the various  systems.  Creating an standard  of ethics for
          those who are  users of computers will  be the best way  since it
          will hold the users to standards that must be met.  Although some
          organizations have attempted to promogate standards regarding the
          ethical   use  of  computer   systems171  no  one   standard  has
          emerged.   Proposed rules  of ethics should  balance the  need of
          individuals to  be able to  learn and discover about  the various
          types of  computer systems, while  at the same time  allowing for
          those  who use those systems  to be secure  in the knowledge that
          the information stored  on the computer will not be read by those
          other then person who should have access to it.
               If  computer crime  laws are  enacted,  industries that  use
          computers should not use the new laws as a  replacement for using
          adequate  security  measures.172    Individuals  or  corporations
          that use computer  have several ways  to protect themselves  from
          unauthorized access.  If the computer can be accessed by a modem,
          the computer  can have a  dial back  feature placed on  the phone
          line so that one a  computer is accessed, the computer will  then
          call back to make sure that the call  is coming from a line which
          is  supposed  to access  the  computer.173    The proper  use  of
          passwords174 are also  an effective  way to  address the  problem
          of unauthorized access. A recent study  has shown that out of 100
          passwords  files, approximately 30 percent were guessed by either
          using the  account name  or a  variation of  it.175    A  program
          has recently been developed that will not allow a user to  select
          an  obvious password.176   Encryption  programs,  similar to  the
          program used on Unix operating system, can scramble a password in
          a non reversible  manner so that if the  encrypted password falls
          into the hands of an individual who is not supposed to access the
          system, the  person will  not  be able  to get  into the  system.
          These systems can also be used so that if a hacker does  get into
          a   computer  system  and   attempts  to  get   information,  the
          information will not be readable.177
               A    problem  that must  be  address  is  the  lack of  laws
          concerning copyright protection of  computer programs in  foreign
          countries.    The  Pakistan Brain178  was  written  to discourage
          copying of a program without authorization.  By creating pirating
          penalties a reason  for the creation of computer  viruses will be
          removed and less viruses will be created.179
               Many in the field argue that computer programs should not be
          copyrighted.180    Copyright protection  should  not  be afforded
          to   computer   programs   since  they   are   only  mathematical
          equations.181   Copyright  protection  should  be  given  to  the
          maker  of  a computer  programmer  only  for  a short  period  of
          time.182
               A novel concept which will both satisfy the computer hackers
          quest  for  knowledge  through  examining  computer  systems  and
          protect the integrity of computer systems is to create a computer
          systems for  the use  of hackers alone.183   This  computer would
          not be connected  to other computer systems, but  can be accessed
          through  a modem.184   If  created,  accounts would  be given  to
          all  interested computer  enthusiasts.  Those  participating will
          not  be  prosecuted  for  exploring  unauthorized  areas  of  the
          system.185     Since   other  computer   systems   will  not   be
          accessible through  this system, any activity on this system will
          not endanger  the information on  other systems.186   By allowing
          this to be done, a major problem will be solved, the inability to
          afford to  buy a mainframe system,  while a person  will still be
          able to learn about different types of systems.
               If any  laws are to  be made, they should  make "knowing"187
          or  "intentionally"188   unauthorized access  into  a computer  a
          crime.   By making  the intent of  the crime be  knowing, it will
          allow those who accidently connect to a computer system that they
          think is theirs but is not to be excused from punishment.
               The law must also be done in a way that will allow it to  be
          enforced  across  national  boundaries.   A  computer  hacker can
          access  computers from across the world  without ever leaving his
          home  country.189   If these  laws  can only  be enforced  within
          the home country, then a person can, in theory, go into a country
          of whose computers that  he would never want to access and access
          into other computers without fear of punishment.190
               An international  convention should  be convened  to address
          this problem.  Since the  problem is of international concern and
          the crimes do occur across  the boarders of countries, by setting
          standards by the international  community concerning the  conduct
          of computer users, the hodgepodge  of computer crime laws will be
          eradicated in favor  of a common international standard.   As the
          boundaries in Western  Europe disappear in anticipation  of 1992,
          international access is sure to accelerate.
               Colleges,  Universities  and  high  schools  must  institute
          programs  designed to address  proper computer use.191   Although
          not all  computer users are  not trained in school,  teaching the
          ethical use of computers will  allow users to understand the need
          for security  on systems.   These programs  will also  show users
          that  computer  crime  is  dangerous  to  society.192    Problems
          concerning computer  crime  should be  publicized  so as  not  to
          mystify the crime.193
               The  United  States  and other  countries  must  create more
          Computer  Emergency Response Teams  (CERT).   These teams  are to
          coordinate   community   responses   to   emergency   situations,
          coordinate responsibility for fixing hole in computer systems and
          serve  as a  focal  point  for  discussions  concerning  computer
          systems.194    These  groups regularly  post  notices  concerning
          computer  viruses or  other  dangers  in  the  Internet  computer
          system.  The scope of these groups should be expanded so they may
          be  a  focal point  of the  needs  and desires  of those  who use
          computers.  If  they are used to gather information as a clearing
          house  type  operation,  the  spread  of  information  concerning
          computer  systems  and problems  with  the systems  will  be more
          adequately addressed.

          IV.  Conclusion
               Computer crime is a growing problem.  With the advent of the
          computer and a more computer literate public, crimes committed by
          computers will  increase.   To effectively  address the  problem,
          laws  must be  created to  outlaw activity  which is  designed to
          further illegitimate  ends.  These  laws have moved in  the right
          direction concerning what should be  outlaws so as to balance the
          needs of computer users against those of the computer owners.  To
          enforce these  laws, governments must realize that the problem of
          computer crime is not only of local concern.
               Educational programs and standards of ethics must be created
          from within the computer users community.  Corporations which use
          computers  must educate their  employees to reduce  the fear that
          one  might  have  when  addressing  a  computer  security  issue.
          Copyright laws must  be strengthened in countries  that either do
          not have  or have weak copyright laws so  that the need to create
          viruses to protect an individual's or corporation's work will  no
          longer be necessary.
               To  satisfy users  curiosity  with  computers, a  non-secure
          computer system should be created.   This system will allow those
          who wish  to explore a  system in order to  understand the system
          may.    Those   individuals  can  do  so  without   the  fear  of
          prosecution.
               Only by directly addressing the causes of computer crime and
          drafting standards and  laws to address the unique  area will the
          problem of computer crime be adequately addressed.  Light must be
          shined on  the area so individuals will  realize that fear of the
          machines  is not justified.   Only by  doing so may  we enter the
          21st century realizing the full potential of computers.

                                      Appendix A
          Ghana Computer Crime Law (Proposed)
          Computer Crime Law
          Computer Crime Law
          In  pursuance   of  the  Provisional   National  Defense  Council
          (Establishment) Proclamation 1981, this Law is hereby made:
          1.   Any person who, with intent to defraud,
               (a)  alters, damages, destroys or otherwise manipulates data
          or program stored in or used in connection with a computer, or
               (b)  obtains  by any means, information stored in a computer
          and uses it to his advantage or to another  person's advantage to
          the disadvantage of any other person, or
               (c)  uses a computer
          commits an offense.
          Charge:   Computer-related fraud.
          ALTERNATIVE:
               (1)  A  person commits  an offense  if  that person  obtains
                    access to a computer program or data, whether stored in
                    or used in connection with a  computer or to a part  of
                    such program  or data to  erase or otherwise  alter the
                    program or data with the intention-
                    1.   (a)  of procuring  an  advantage  for  himself  or
                         another person: or
                         (b)  of damaging another person's interests.

          2.   Any  person who, by  any means, without  authority, wilfully
               destroys, damages,  injures, alters  or renders  ineffective
               data stored in or used in connection with a computer commits
               an offense.
          Charge:   Damaging Computer data.

          3.   Any person who, without authority, knowingly uses a computer
               commits and offense.
          Charge:   Unauthorized use of a computer.

          4.   Any person who, without authority, knowingly gains access to
               a computer, computer network, or any part thereof commits an
               offense.
          Charge:   Unauthorized access to a computer.

          5.   Any  person  who,   knowingly  and  dishonestly  introduces,
               records  or  stores, or  causes  to be  recorded,  stored or
               introduced into a computer or computer network by any means,
               false or misleading information as data commits an offense.
          Charge:   Insertion of false information as data.

          ALTERNATIVE:
               (5)  A person commits an offense if, not having authority to
                    obtain  access to a  computer program or  data, whether
                    stored in or used in  connection with a computer, or to
                    a  part  of such  program  or  data,  he  obtains  such
                    unauthorized  access   and  damages   another  person's
                    interests by recklessly adding to, erasing or otherwise
                    altering the program or the data.
          6.   Any person under  a contractual or other  duty to introduce,
               record or store authorised data into a computer network, who
               negligently  or dishonestly  fails to  introduce, record  or
               store, commits an offense.
          Charge:   Omission to introduce, record or store data.

          ALTERNATIVE
               (6)  Any  person  under  a  contractual  or  other  duty  to
                    introduce,  record or  store data  into  a computer  or
                    computer network  who negligently or  dishonestly fails
                    to introduce, record or store, commits an offense.

          7.   Any  authorised person who willfully or intentionally allows
               information  from a  computer to  get into  the hands  of an
               unauthorised  person   who  uses  such  information  to  his
               advantage commits an offense.
          Charge:   Allowing unauthorised person to use computer data.

          8.   A  person guilty  of  an  offense under  this  Law shall  be
               liable:-
               (a)  on summary conviction,  to imprisonment for a  term not
                    exceeding  two years  or to  a  fine not  exceeding the
                    statutory maximum or both; or
               (b)  on conviction on indictment, to imprisonment for a term
                    not  exceeding ten years  or to  an unlimited  fine, or
                    both.

          9.   A  court in  Ghana  shall  have  jurisdiction  to  entertain
               proceedings for  an offense under  this Law, if at  the time
               the offense was committed:-
               (a)  the accused was in Ghana; or
               (b)  the program  or  the  data in  relation  to  which  the
                    offence  was committed  was stored  in or  used with  a
                                                           or  used with
                    computer or computer network in Ghana.
                                computer network in Ghana.

          10.  In this Law, unless the context otherwise requires:-
               "access"  includes  to  log unto,  instruct,  store  data or
               programs  in, retrieve data  or programs from,  or otherwise
               communicate  with a  computer, or  gain  access to  (whether
               directly or with the aid of any device) any data or program.
               "computer"   includes  any   device  which  is   capable  of
               performing logical,  arithmetical, classifactory,  mnemonic,
               storage  or  other  like  functions  by  means  of  optical,
               electronic or magnetic signals.
               "Computer network"  includes the  interconnection of  two or
               more computers, whether geographically separated or in close
               proximity or  the interconnection  of communication  systems
               with a computer through terminals, whether remote or local.
               "Computer program" includes  an instruction or statement  or
               series  of instructions or  statements capable of  causing a
               computer to indicate, perform, or achieve any function.
               "data"  includes  a  representation   in  any  form  whether
               tangible or intangible that is capable of being stored in or
               retrieved by a computer.

                                       ENDNOTES
                                       ENDNOTES
          1.   Financial Times Limited (London) April, 1990.

          2.   See, infra, endnote 36 and accompanying text.
                    infra

          3.   Stoll, The Cuckoo's Egg (1990).  [hereinafter Stoll].
                      The Cuckoo's Egg

          4.   Lyons, 13 Are  Charged in Theft of Data  from Computers, New


          York Times, August 17, 1990, B2, col. 3.

          5.   Although   there  is  no   set  definition  of   a  computer


          publication,  it is created  and published solely  on a computer.


          Peretti,  Computer Publications  and the  First Amendment  (1990)


          (available  at Princeton  University FTP  site  and The  American


          University Journal of International Law and Policy Office).

          6.   Dorothy  Denning,  The   United  States  v.   Craig  Neidorf


          (available  at The American  University Journal  of International


          Law and Policy office).

          7.   Schares,  A  German  Hackers'  Club that  Promotes  Creative


          Chaos, Business Week, Aug. 1, 1988, 71.

          8.   Barlow, Crime and  Puzzlement: In advance of the  Law on the


          Electronic Frontier, Whole Earth Review, Sept. 22, 1990, 44.

          9.   Kopetman, Computer  Gave Them  Bum Rap,  Los Angeles  Times,
                                                        Los Angeles  Times


          Jan. 10, 1991, at B1, col. 2.

          10.  See, J. Thomas McEwen, Dedicated Computer Crime Units (19--)
               See,



          (stating how  important computers  have become  to society).   In


          1978 there were 5,000 desktop computers in the United States.  S.


          Rep. No.  432, 99th  Cong., 2d Sess.  2, reprinted in,  1986 U.S.
                                                   reprinted in


          Code Cong. &  Admin. News 2479, 2479.   By 1986, this  number had


          increased to about 5 million.  Id.
                                         Id.

          11.  See, S. 2476, Floor Statement by Senator Patrick Leahy.

          12.   See,  Stoll  at  ___ (stating  that  all countries,  except


          Albania, are connected via computer systems).

          13.   McEwen, Dedicated Computer  Crime Units 1 (19--).   Another
                        _______________________________


          definition used  is  the definition  of computer  crime was  "any


          illegal  act  for  which  knowledge  of  computer  technology  is


          essential for successful investigation and prosecution".  Parker,


          Computer Crime:  Criminal Justice Resource Manual, (1989).
          _________________________________________________

          14.  Conly,  Organizing  for  Computer  Crime  Investigation  and


          Prosecution, 6-7 (19--).

          15.  For instance,  the estimated  cost of  the Internet Worm,  a


          computer program created  by Robert Morris,  Jr. which shut  down


          the  Internet  computer  system, varies  from  $97,000,000  (John


          McAfee,  Chairman,  Computer   Virus  Industry  Association)   to

          $100,000  (Clifford Stoll's low  bound estimate).   Commitment to


          Security, 34  (1989).  It  is difficult to determine  exactly the


          cost  of such  crime because  it is  difficult to  determine what


          should be included.  The estimated downtime of a  computer due to


          such activity  could be used to determine the  cost.  This may be


          flawed, however, since it will not take into account how  much of


          the down  time actually  would have been  used.   Electronic Mail


          Letter from Richard  Stallman to Brian J. Peretti  (Dec. 3, 1990)


          (concerning computer crime).

          16.  Commitment   to  Security,   34.    The   average  facility,


          consisting  of  1,224  microcomputers,  96  minicomputers and  10


          mainframe  computers, lost $109,000,  365 personnel hours  and 26


          hours computer time loss per year. Id.
                                             Id.

          17.  Id. at 23. 6 percent of  incidents resulted in prosecutions.
               Id.


          Id.
          Id.

          18.  Id.
               Id.

          19.    Only 1.5 percent of  respondents to a National  Center for


          Computer Crime Data used Anti-virus  products in 1985.   By  1988


          this figure  rose to  22 percent.   By  1991, 53  percent of  the



          respondents stated that  they would be using  anti-virus software


          by  1991.   According  to  a  Price  Waterhouse survey  in  Great


          Britain,  in 1985  26  percent  installations  spent  nothing  on


          security.   Authers,  Crime  as  a  Business  Risk-  Security/  A
                                Crime  as  a  Business  Risk-  Security/  A


          Management  as Well  as  a  Technical  Problem,  Financial  Times
          Management  as Well  as  a  Technical  Problem


          (London), November 7, 1990.  By 1990 this figure had shrunk  to 4


          percent and is  expected to decline to 0 by 1995. Id.  The amount
                                                            Id.


          spent on security for new systems has increased from 5 percent in


          1985 to 9 percent by 1990. Id.
                                     Id.


               In Japan, less  than 10 percent of groups  that rely heavily


          on  computers have  taken  measures  to  prevent  virus  attacks.


          Computer  Users Fail to Protected Against Viruses. Although Japan
          Computer  Users Fail to Protected Against Viruses.


          does not  have a computer crime law, there  is a movement to make


          such a law.   Computer Body Calls for Jail Sentences for Hackers,
                        Computer Body Calls for Jail Sentences for Hackers


          Kyodo News  Service,  Nov. 15,  1990  (available from  the  Nexis


          library).     The   Japan   Information  Processing   Development


          Association has  stated that  the new law  should make  the crime


          punishable of either one year of hard labor or a fine. Id.
                                                             

          20.  The terms was first applied in 1984. Commitment to Security,


          34 (1989).

          21.  Ring, Computer Viruses; Once Revered as Hackers, Technopaths


          Threaten  Security of  Computer-Dependant Society,  Computergram,


          July 7,  1989.  Some of  these viruses are  extremely small, e.g.


          Tiny, which is 163 bytes, may be the smallest.  Friday 13th Virus


          Alert, The Times (London), July 12, 1990.

          22.  Graggs, Foreign  Virus Strains  Emerge as  Latest Threat  to
                       Foreign  Virus Strains  Emerge as  Latest Threat  to


          U.S. PCs,  Infoworld, Feb.  4, 1991, 18.   Viruses  have appeared
          U.S. PCs


          from Bulgaria, Germany, Australia, China and Taiwan. Id. Some new
                                                               Id.


          viruses  include Armageddon,  from Greece  which  attacks through


          modems and then dials to a talking clock in  Crete, Liberty, from


          Indonesia,  Bulgaria 50,  which is  thought to  have come  from a


          "laboratory"  in Sofia,  Victor,  thought  to  originate  in  the


          U.S.S.R., the Joker,  from Poland, which tells the  user that the


          computer needs a  hamburger, and Saturday  the 14th, presumed  to


          have been developed in South Africa,  which destroys a computer's


          file allocation table. Id.
        
          Some viruses also  carry a message when  they are activated.


          A  virus that is  though to  have been  developed by  students at


          Wellington, New  Zealand,  tells the  user  that they  have  been


          "stoned" and requests that marijuana should be legalized.  Id.
                                                                     Id.


               Approximately 80  or 90 of  the 300 viruses counted  for the


          IBM  personal computer originated in Bulgaria according to Morton


          Swimmer of Germany's Hamburg University Virus Test Center.




          23.  A report in  La Liberation, a French  newspaper, stated that
                            La Liberation


          computer viruses  could be planted  in French EXOCET  missiles to


          misguide  them  when  fired.    La  Liberation,  Jan.  10,  1991,


          reprinted in  Klaus Brunnstein,  Risks-Forum, vol.  10, iss.  78,
          reprinted in


          Jan. 22  1991 (available at American Journal of International Law


          and Policy Office).

          24.  A  "trojan horse"  is a  program that  does not  seem to  be


          infected, however,  when used  in a computer,  the virus  is then


          transferred  the uninfected machine.   On trojan  horse destroyed


          168,000 files in Texas.  Commitment to Security, 34 (1989).

          25.  Ring, Computer Viruses; Once Revered as Hackers, Technopaths
                     Computer Viruses; Once Revered as Hackers, Technopaths





          Threaten  Security of  Computer-Dependent Society,  ComputerGram,
          Threaten  Security of  Computer-Dependent Society


          July 7, 1989.

          26.  Highland, One Wild  Computer "Worm" Really Isn't  a  Federal
                         One Wild  Computer "Worm" Really Isn't  a  Federal


          Case, Newsday, Jan. 23, 1990, 51.
          Case

          27.  Stoll, at 346.   The amount of computers  that were actually


          infected by the worm  is still the subject of debate.   Mr. Stoll


          estimates that  2,000 computers  where infected,  while the  most


          commonly  cited  number is  6,000.   Commitment  to  Security, 34


          (1989).    The 6,000  estimate  was  based  on  an  Massachusetts


          Institute of Technology estimate that 10 percent of the  machines


          at the school  were infected and was  then inferred to  the total


          number  of  machines  across  the  country  that  were  affected.


          General Accounting  Office, Computer  Security: Virus  Highlights


          Need for Improved  Internet Management, 17  (1989).  This  number


          may be inaccurate  because not all locations had  the same amount


          of vulnerable machines. Id.
                                  Id.

          28.       For the  first  eight months  of  1988, there  were 800


          incidents  concerning computer  viruses. Commitment  to Security,


          34.  The Computer  Virus Industry  Association  reported that  96




          percent of  these reported infections were incorrectly identified


          as viruses. Id.
                      Id.

          29.   Robinson, Virus Protection  for Network Users,   Washington


          Post, Washington Business, p.44, Feb. 11, 1991.

          30.  Ross,  Hacking   Away  at  the   Counterculture,  3   (1990)


          (available at the  American University  Journal of  International


          Law  and Policy).  On Saturday Night Live, during the news update


          segment, Dennis Miller stated, in comparing a computer viruses to


          the   AIDS  virus,  "Remember,  when  you  connect  with  another


          computer, you're connecting  to every computer that  computer has


          ever been connected to."  Id.
                                    Id.

          31.  Id. at 8-9.
               Id.

          32.  Computer Virus Legislation, Hearing on  H.R. 55 and H.R. 287


          before the Subcomm. on Criminal Justice of the House Comm. on the


          Judiciary, 100th  Cong., 1st Sess.  49 (1989) (statement  of Marc


          Rotenberg,   Director,   Computer    Professionals   for   Social


          Responsibility).   In Israel,  Hebrew University used  a computer


          virus to  detect and  destroy a virus  that would  have destroyed


          data files. Id.
                      Id.




          33.  Computergram International, October 14, 1990.

          34.

          35.  Watts, Fears of Computer Virus Attack from East Europe grow,
                      Fears of Computer Virus Attack from East Europe grow


          The Independent, November 24, 1990, p.6.   On a trip to Bulgaria,


          a British computer consultant  returned with 100 viruses  that do


          not exist in the West. Id.
                                 Id.

          36.  Id.

          37.  McGourty, When a Hacker Cracks the Code, The Daily Telegraph
                         When a Hacker Cracks the Code


          (London), October 22, 1990, p. 31.

          38.  The equipment would cost about 50 (British) pounds. Id.
                                                                   Id.

          39.  Id.   A British company, has stated that they have developed
               Id.


          a glass that  will reduce this problem.   Tieman, Spy-Proof Glass


          to Beat the Hackers, The (London) Times, Jan 17, 1991.


               A  more  recent  problem concerns  the  ability  of computer


          hackers to access into fax  machines and either change or reroute


          information from the machine. Becket, Espionage fears mounting as
                                                Espionage fears mounting as


          hackers tap into faxes, The Daily Telegraph (London), December 1,
          hackers tap into faxes


          1990,  p. 23.  This problem  can be  circumvented by  the  use of


          encryption devices or passwords on the machine.  Id.
                                                           Id.

          40.  Stoll  at 9.  The  word itself originally had  two meanings.



          People originally called themselves hackers were software wizards


          who thoroughly knew computer systems.  Id.  In U.S. v. Riggs, 739
                                                         U.S. v. Riggs


          F. Supp. 414, 423 (N.D. Ill.  1990) the court defined hackers  as


          "individuals involved  with the  unauthorized access  of computer


          systems by various  means."  The New Hacker's  Dictionary defines


          hackers  as  "A  person  who  enjoys  learning   the  details  of


          programming systems  and how  to stretch  their capabilities,  as


          opposed  to most  users  who  prefer to  learn  only the  minimum


          necessary."    New  Hacker's Dictionary, to  be published Spring,


          1991.


               Hacker has also been used in a  non-evil sense with the word


          "cracker"  taking the  disreputable part  of the  word.   In this


          light,  hacker means "computer  enthusiasts who `take  delight in


          experimenting  with system  hardware, software  and communication


          systems."  and cracker  meaning  "a  hacker  who  specializes  in


          gaining illegal  access to a  system."  One Wild  Computer `Worm'
                                                  One Wild  Computer `Worm'


          Really Isn't  a Federal  Case, Newsday, January  23, 1990,  p.51.
          Really Isn't  a Federal  Case


          The typical hacker has been described  as "a juvenile with a home

          computer  who  uses  computerized bulletin  board  systems  for a


          variety  of illegal  purposes.   Conly,  Organizing for  Computer


          Crime Investigation and Prosecution, 8 (19--).


          41.   Sulski, How to Thwart  Potential Saboteur, Chicago Tribune,
                        How to Thwart  Potential Saboteur


          November 18, 1990, p.18.

          42.  Computerworld, December 3,  1990, p. 122. Kryptik,  a hacker


          group,  was  stated as  having  planned  to plant  a  virus  in a


          telephone  network on  December  5,  1990. Id.    It is  unclear,
                                                     Id.


          however, if the virus actually was planted. Id.
                                                      Id.

          43.  Sulski, How to  Thwart Potential Saboteur, Chicago  Tribune,
                       How to  Thwart Potential Saboteur


          November  18, 1990, p.18.   Computer security  experts state that


          the  risk of  having hacker break  into your system  is less than


          being burglarized or having a power outage due to lightning.  Id.
                                                                        Id.


          Errant opinion poll  results have also been blamed on the work of


          hackers.    Holdsworth,   Hackers  May  Have  Attacked   TV  Poll
                                    Hackers  May  Have  Attacked   TV  Poll


          Computers-MP,  Press Association Newsfile, May 4, 1990.
          Computers-MP

          44.  Stoll, 312.

          45.  Id.  This  view is also shared  by the editors of  2600, The
               Id.



          Hackers  Quarterly.   It is  also held  by  these persons  that a


          service  is done  to the  computing  community because  those who


          break in to computer systems show the operators that their system


          is not strong enough and that it should be made stronger.

          46.  Stoll, at 354.

          47.   Mr.  Stoll's computer  was broken  into by   an  Australian


          hacker who said he  did so to show that Mr.  Stoll's security was


          not  good and  that  hackers  are good  because  they show  where


          security problems are in computer  networks.  Id. at 353-54.   He
                                                        Id.


          rejected such arguments. Id.
                                   Id.

          48.  Director, Computer Professionals for Social Responsibility

          49.  Computer Virus Legislation, Hearing  on H.R. 55 and H.R. 287


          before the Subcomm. on Criminal Justice of the House Comm. on the


          Judiciary, 100th Cong., 1st Sess. 26-27 (1989) (statement of Marc


          Rotenberg,   Director,   Computer    Professionals   for   Social


          Responsibility). The Aldus peace virus, which displayed a message


          calling  for  peace  and then  disappeared  without  damaging the


          system itself, is an example of a virus  which he believes should


          be protected.  Id.
                         Id.


          50.  Commitment to Security, 34.

          51.  Stoll, 349.

          52.  "I can never understand why people think it is  all right to


          run out of computer paper but not all right to be infected with a


          virus.  The  disruption is the same  and it takes about  the same


          amount of  time to  put matters  right."   Cane, Hygiene  See Off
                                                           Hygiene  See Off


          Computer  Viruses, Financial  Times  (London)  October 14,  1989,
          Computer  Viruses


          Section I, p. 24.

          53.  18 U.S.C. 1030 (1988).

          54.      Ala. Code    13A-8-100  et.seq. (1990); Alaska  Stat.
                   Ala. Code                               Alaska  Stat.


          11.46.200(a)(3), 11.46.484(a)(5), 11.46.740, 11.46.985, 11.46.990


          (1990);  Ariz. Rev. Stat. Ann.   13-2301(E), 13-2316 (1990); Cal.
                   Ariz. Rev. Stat. Ann.                               Cal.


          Penal Code    502 (West 1990); Colo. Rev.  Stat.   18-5.5-101 et.
          Penal Code                     Colo. Rev.  Stat.


          seq. (1990); Conn. Gen. Stat    53a-250 et. seq., 52-570b (1990);
                       Conn. Gen. Stat


          Del. Code  Ann. tit.  11,     931 et  seq. (1990);  Fla. Stat.
          Del. Code  Ann.                                     Fla. Stat.


          815.01 et seq.  (1990); Ga. Code  Ann.    16-9-90 et seq  (1990);
                                  Ga. Code  Ann.


          Haw. Rev. Stat.    708-890 et seq. (1990); Idaho Code    18-2201,
          Haw. Rev. Stat.                            Idaho Code


          2202  (1990); Ill.  Ann. Stat.     15-1,  16-9 (1990);  Ind. Code
                        Ill.  Ann. Stat                           Ind. Code


            35-43-1-4,  35-43-2-3  (1990);  Iowa Code      716A.1  et. seq.
                                            Iowa Code



          (1990); Kan.  Stat. Ann.   21-3755 (1990); Ky. Rev. Stat. Ann.
                  Kan.  Stat. Ann.                   Ky. Rev. Stat. Ann.


          434.840  et. seq. (1990);  La. Rev. Stat.  Ann. 14(D)     71.1 et
                                     La. Rev. Stat.  Ann


          seq.  (1990); Me.  Rev.  Stat.  Ann. chap.  15,  tit. 17-A,   357
                        Me.  Rev.  Stat.  Ann.


          (1990); Md.  Crim. Law  Code Ann. Article  27   45A,  146 (1990);
                  Md.  Crim. Law  Code Ann.


          Mass. Gen. L. ch 266,   30 (1990) see infra; Mich. Comp.  Laws
          Mass. Gen. L.                                Mich. Comp.  Laws


          28.529(1)  et seq. (1990);  Minn. Stat.   609.87  et seq. (1990);
                                      Minn. Stat.


          Miss. Code Ann.   97-45-1 et seq (1990); Mo. Rev. Stat.   569.093
          Miss. Code Ann.                          Mo. Rev. Stat.


          et  seq. (1990);  Mont. Code  Ann.    45-2-101, 45-6-310,45-6-311
                            Mont. Code  Ann.


          (1990); Neb. Rev. Stat. art. 13(p),   28-1343 et seq (1990); Nev.
                  Neb. Rev. Stat.                                      Nev.


          Rev.  Stat.    205.473  et  seq. (1990);  N.H.  Rev.  Stat.  Ann.
          Rev.  Stat.                               N.H.  Rev.  Stat.  Ann.


            638.16  et seq. (1990); N.J. Rev. Stat.   2C:20-1, 2C:20-23 et.
                                    N.J. Rev. Stat.


          seq., 2A:38A-1  et seq.  (1990); N.M. Stat.  Ann.     30-16A-1 et
                                           N.M. Stat.  Ann.


          seq. (1990); N.Y. Penal Law    155.00, 156.00 et seq, 165.15(10),
                       N.Y. Penal Law


          170.00,  175.00 (1990); N.C.  Gen. Stat.   14-453  et seq (1990);
                                  N.C.  Gen. Stat.


          N.D. Cent. Code 12.1-06.1.01(3),  12.1-06.1-08 (1990); Ohio  Rev.
          N.D. Cent. Code                                        Ohio  Rev.


          Code  Ann.    2901.01, 2913.01, 1913.04, 1913.81 (Anderson 1990);
          Code  Ann.


          Okla. Stat. tit.  21,    1951 et  seq. (1990); Or. Rev.  Stat.
          Okla. Stat                                     Or. Rev.  Stat.


          164.125, 164.377  (1990);   Pa.  Cons. Stat.   1933  (1990); R.I.
                                      Pa.  Cons. Stat.                 R.I.



          Gen. Laws    11-52-1 et seq (1990); S.C. Code Ann.    16-16-10 et
          Gen. Laws                           S.C. Code Ann.


          seq (Law. Co-op 1990); S.D. Codified Laws Ann.   43-43B-1 et seq.
                                 S.D. Codified Laws Ann.


          (1990);  Tenn. Code Ann.    39-3-1401 et  seq (1990);  Texas Code
                   Tenn. Code Ann.                               Texas Code


          Ann. tit 7   33.01 et seq. (Vernon 1990); 19   Utah Laws    76-6-
          Ann.                                           Utah Laws


          701 et  seq.; Va.  Code Ann.   18.2-152.1  et seq.  (1990); Wash.
                        Va.  Code Ann.                                Wash.


          Rev.  Code Ann.   9A.48.100, 9A.52.010, 9A.52.110 et seq. (1990);
          Rev.  Code Ann.


          Wis. Stat.   943.70 (1990); Wyo. Stat.   6-3-501 et seq. (1990).
          Wis. Stat.                  Wyo. Stat.

          55.   Parker, Computer Crime:   Criminal Justice Resource Manual,


          129 (1979).

          56.   McEwen, Dedicated Computer  Crime Units, 60 (1989).   These


          other laws include  embezzlement, larceny, fraud, wire  fraud and


          mail fraud.  Id. at 60.
                       ___

          57.  Pub. L. No. 98-473,   2102(a), 98 Stat. 1837, 2190 (codified


          at 18 U.S.C.   1030).

          58.  S.  Rep.  No.  432,  99th  Cong., 2d  Sess.,  1986  U.S.  2,


          reprinted in, 1986 Cong. & Admin. News 2479, 2479.
          reprinted in

          59.  Pub. L. No. 99-474,   2, 100 Stat. 1213 (amending 18  U.S.C.


            1030).

          60.  18 U.S.C.   1030(b).

          61.  18 U.S.C.   1030(a)(1).   The person  must act  knowingly to



          access a computer  either without authorization or  exceeding the


          authorization given  and obtain  information with  the intent  or


          reason  to believe that  the information  will either  injure the


          United  States of  American or  give  an advantage  to a  foreign


          nation.  As  seen by the placement  of this section, it  is clear


          that  the Congress was  particularity aware  of the  dangers that


          computer  might  have to  the  national  security of  the  United


          States.   This  section parallels  18  U.S.C.  793,  the  federal


          espionage statute.

          62.  1030(c)(1)(A).

          63.  1030(c)(1)(B).

          64.  As defined by the Fair  Credit Reporting Act, 15 U.S.C. 1681


          et seq.

          65.  1030(c)(2)(A).

          66.  1030(c)(2)(B).  The penalty is up to 10 years in prison.

          67.  18 U.S.C.   1030(a)(2).

          68.  18 U.S.C.   1030(c)(2)(B).

          69.  18 U.S.C.   1030(c)(2)(B).

          70.  The punishments that may be handed out are up to 5 years for


          the first offense and 10 years for any subsequent offense.

          71.  18 U.S.C.  1030(a)(5).


          72.  18 U.S.C.   1030(c)(3)(A).

          73.  18 U.S.C.   1030(c)(3)(B).

          74.  18 U.S.C.   1030(a)(6).

          75.  As defined by 18 U.S.C.   1029.

          76.  18 U.S.C.  1030(c)(2)(A).

          77.  18 U.S.C.   1030(c)(2)(B).

          78.  18 U.S.C.   1030(a)(6)(B).

          79.  18 U.S.C.   1030(a)(6)(B).

          80.  These computers  include computers used exclusively  for the


          United States government  or a  financial institution  or if  not


          exclusively by  the  government  one which  the  conduct  of  the


          computer affects the government's or the institution's operation,


          18  U.S.C. 1030(e)(2)(A),  the computer  is  one of  two or  more


          computers  that  commit  the  offense,  18  U.S.C. 1030(e)(2)(A).


          Financial  institution is  defined in  18  U.S.C. 1030(e)(4)  and


          includes  and institution  whose  deposits  are  insured  by  the


          Federal Deposit Insurance Corporation, 1030(e)(4)(A), the Federal


          Reserve or  one of  its  members, 1030(e)(4)(B),  a credit  union


          insured   by   the   National    Credit   Union   Administration,


          1030(e)(4)(C),   a  Federal   home  loan   bank   system  member,


          1030(e)(4)(D),  institutions under the  Farm Credit Act  of 1971,


          1030(e)(4)(F), a broker-dealer registered pursuant to   15 of the


          Securities Exchange Act  of 1934, 1030(e)(4)(F), or  a Securities


          Investor Protection Corporation, 1030(e)(4)(G).

          81.  S. Rep.  No. 432, 99th Cong., 2d Sess. 4, reprinted in, 1986
                                                         reprinted in


          U.S. Code Cong. & Admin. News 2479, 2481.

          82.  Note, Computer Crime and The Computer Fraud and Abuse Act of


          1986, X Computer/Law Journal 71, 79, (1990).

          83.  18 U.S.C.   1030 (e)(2) states:


               As used in this section-


               (2)  The term "Federal interest computer" means a computer-


                    (A)  exclusively for the use of a financial institution


          or the  United States Government, or,  in the case  of a computer


          not  exclusively  for  such  use,  used by  or  for  a  financial


          institution  or  the  United States  Government  and  the conduct


          constituting  the  offense  affects  the  use  of  the  financial


          institution's  operation or  the  Government's operation  of such


          computer; or


                    (B)  which is one  of two or more computer  used in the


          committing the  offense, not all of which are located in the same


          state.

          84.  "[T]here is  not statute  specifically addressing  viruses."


          135 Cong. Rec.  E2124 (daily ed. June  14, 1989) (letter of  Rep.
              Cong. Rec.  E2124


          Herger (quoting FBI Director William Sessions)).

          85.  H.R. 287 and H.R. 55.

          86.  "Existing  criminal statues are not specific on the question


          of  whether unauthorized  access is  a  crime where  no theft  or


          damage  occurs . .  ." 135 Cong.  Rec. E2124 (daily  ed. June 14,
                                     Cong.  Rec.


          1989)  (letter of  Rep.  Herger  (quoting  FBI  Director  William


          Sessions)).

          87.  Prosecution could occur under a trespass law.  It may not be


          applicable, however, since trespass is a property based crime and


          courts have not recognized information in the same manner as real


          property.

          88.  Note, Computer Crime and The Computer Fraud and Abuse Act of


          1986, X Computer/Law Journal 71, 80 (1990).

          89.  Id.
               Id.

          90.  Shalgi,  Computer-ware: Protection and Evidence,  An Israeli
                        Computer-ware: Protection and Evidence,  An Israeli


          Draft  Bill,  IX  Computer/Law J.  299,  299  (1989) [hereinafter
          Draft  Bill       Computer/Law J.


          Shalgi].  This proposed bill has not progressed much since it was


          proposed and is at the stage prior to an official "bill".  Letter


          from Barry  Levenfeld  to Brian  J. Peretti  (December 13,  1990)


          (concerning  Israel's legislature  progress on  the comprehensive


          computer  law).     This  paper  will  use  the   Shalgi  English


          translation of the law.

          91.  Chapter 2 concerns Offenses and Accessing Computers, Chapter


          3, Damages, Chapter 4, Rights of Software Creators and Chapter 5,


          Evidence. Levenfeld, Israel Considers Comprehensive Computer Law,
                               Israel Considers Comprehensive Computer Law,


           Int'l Computer L Advisor 4 (March 1988).  The topics  covered in
           Int'l Computer L Advisor


          Chapters 2 through 5 are beyond the scope of this paper.

          92.

          93.  Shagli, at 311.

          94.  Chapter 2,   2, Shagli at 311.

          95.  Chapter 2,   3(a), Shagli at 311.   An employee is exempt if


          he commits this  act when  it was  due to a  strike concerning  a


          labor dispute. Chapter 2,  3(b), Shagli at 311.

          96.  Chapter 2,   4(a).

          97.  Chapter 2,   4(b), Shagli at 311.

          98.  As defined by Chapter 1,   1.

          99.  Chapter 2,   5, Shagli at 311.



          100. Chapter 2,   6, Shagli at 312.

          101. Chapter 2,   7, Shagli at 312.

          102. Chapter 2,   9, Shagli at 312.

          103. Id.
               Id.

          104. Chapter 2,   10, Shagli at 312.

          105. By  not  stating that  this also  applies to  individuals or


          others (non-corporations) who  are attempting to supply  services


          to the public, some important services that may be offered to the


          public  may not  be  done.   Levenfeld,  8,  translates the  word


          corporation as entities which may solve the problem.

          106. Shalgi, 312.  Levenfeld, 5,  states that since this  section


          is  so broad  the only  possible areas that  are not  covered are


          personal and academic uses.

          107. Chapter 2,   14, Shagli at 313.

          108.  Section 5.

          109. Levenfeld,  4-5.   Perhaps the  only  computers not  covered


          would  be those used  for personal or  academic uses exclusively.


          Id. at 5.
          Id.

          110.  Section 5.

          111. Levenfeld,  4-5.   Perhaps the  only  computers not  covered


          would be those  used for personal  or academic uses  exclusively.



          Id. at 5.
          Id.

          112. Levenfeld at 4.

          113. Shalgi, 305.

          114. See,  Computers at Risk,  Safe Computing in  the Information


          Age, 36  (1991) (discussing the  need for a repository  to gather


          computer crime information).

          115. Chapter 2,   12, Shagli at 313.

          116. New Hacker's Dictionary.

          117. Chapter 2,    13, Shagli at 313.  The law states that if the


          owner of the computer is not given in his presence, the  order is


          only good for twenty-four hours.  Id.
                                            Id.

          118. Shagli, at 304.   Under Israeli  law, an object that  may be


          proof of an  offense may be seized without a court order. Id. The
                                                                    Id.


          law will bring the seizure of computers in accord with the United


          States Constitution's sixth Amendment.

          119. Chapter 1,   1, Shagli at 310.

          120. Alexander,  Suspect  Arrested  in   AIDS  Disk  Fraud  Case,
                           Suspect  Arrested  in   AIDS  Disk  Fraud  Case


          Computerworld, Feb. 5, 1990, 8.

          121.  Colvin,  Lock up the Keyboard  Criminal, Telecommunications


          PLC (England), June 1990.

          122. Computer Misuse Act, 1990, ch. 18.

          123.   In the five years prior to the  adoption of the Act, there



          were 270  cases of computer misuse  in Britain of  which only six


          were brought to court and only 3 resulting   convictions.  Fagan,


          Technology:  EC urged to  strengthen laws on  computer crime, The
          Technology:  EC urged to  strengthen laws on  computer crime


          Independent (London), February 13, 1990, p. 19.

          124. Id.
               Id.

          125. Davies,  Cracking down on  the computer hackers,  Fin. Times
                        Cracking down on  the computer hackers


          (London), October 4, 1990.

          126. Law Commission No. 186, Cm 819.

          127. Computer Misuse Act, 1990, ch. 18,   1.

          128. The penalty for this type of behavior is up to six months in


          prison, 2000 pounds or both.

          129. Computer Misuse Act, 1990, ch. 18,   2(1)(a).

          130. Computer Misuse Act, 1990, ch. 18,   2(1)(b).

          131. Computer Misuse Act, 1990, ch. 18,   2(5)(a).

          132. Computer Misuse Act, 1990, ch. 18,   2(5)(b).

          133. Computer Misuse Act, 1990, ch. 18,   3(1).

          134. Computer Misuse Act, 1990, ch. 18,   3(7).

          135. Computer Misuse Act, 1990, ch. 18,   3(2).

          136. Computer Misuse Act, 1990, ch. 18,   3(5).

          137. Id.      Colvin,   Lock   up   the   Keyboard   Criminal   ,
               Id.


          Telecommunications PLC (England), June 1990.

          138. Computer Misuse Act, 1990, ch. 18,   4.

          139. Computer Misuse Act, 1990, ch. 18,   4(1).



          140.  5(2) states that a significant link under  1 can be (a) the


          person was in  Great Britain at the  time in which he  caused the


          computer to act in a certain way or (b) the computer he attempted


          to  get access  to  was in  Great  Britain.  5(3)  states that  a


          significant link under  3  can be (a) that  the person was  Great


          Britain at  the time when he did the  act or (b) the modification


          took place in Great Britain.  However, this may not an exhaustive


          list.

          141. Davies,  Cracking down on  the computer hackers,  Fin. Times
                        Cracking down on  the computer hackers


          (London), October 4, 1990.

          142. Computer Misuse Act, 1990, ch. 18,   5.

          143. Although  proposed on February  14, 1989, the  proposed bill


          has not yet become law.

          144. Appendix A,   10.

          145. Appendix A,   1.

          146. Appendix A,   1, alternative.

          147. Appendix A,   2.

          148. Appendix A,   3.

          149. Appendix A,   4.

          150. Appendix A,   5.

          151. Appendix A,   7.

          152. The Ghana  Law Reform  Commission states  that they  created



          their proposed law  from the Scottish Law Commission  and the Law


          Reform  Commission of  Tasmania,  Australia reports  on  computer


          crime.

          153. Appendix A,   9(a).

          154. Appendix A,   8(b).

          155. See, infra, endnote __ and accompanying text.
                    infra

          156. Appendix A,   9(a).

          157. Appendix A,   9(b).

          158. Appendix A,   10.

          159. Appendix A,   6.

          160. Id.
               Id.

          161. Appendix A,   7.

          162. Appendix A,   1.

          163. Appendix A,   10.

          164. Id.
               Id.

          165. Id.
               Id.

          166. The  first computer  crime  law  in  the United  States  was


          enacted in 1979.

          167. S. Rep. No. 432, 99th Cong.,  2d Sess. 3, reprinted in  1986
                                                         reprinted in


          U.S. Code Cong. & Admin. News 2479, 2481.

          168. By increasing  security, the ease  with which one  can enter


          the  system will become more difficult.   Some systems, believing


          that if  such unauthorized  access does  occur that  no sensitive

















          information will be stolen, opt  to have less security then other


          systems.  In actuality, by one system not having enough security,


          the entire network can be put  at danger when a mischievous  user


          wishes to  break into a  users account which  may be  accessed by


          that system.    See  Stoll, 353-54 (stating an  Australian hacker


          broke  into  Mr.  Stoll's computer  account  because  a connected


          computer's system  manager did not wish  to have a high  level of


          security.

          169.    Stoll,  32.     Many  military  computers  and  sensitive


          scientific computers  operate in a  secure environment.   This is


          created by not allowing the computer system to have any telephone


          links to the outside world (i.e. outside of the building.

          170.  By having a secure system, information at the computer site


          can only be removed by a person walking into the computer center,


          copying the  information and then walking  out with it.   This is


          both burdensome  (it is much  easier to access the  computer from


          one's home or office) and cumbersome (since a person will have to


          walk around with reels  of data that will later be  put back into




          the system.

          171. Computer Virus Legislation, Hearing on H.R. 55 and  H.R. 287


          before the Subcomm. on Criminal Justice of the House Comm. on the


          Judiciary, 100th Cong., 1st Sess.  44, n. 27 (1989) (statement of


          Marc  Rotenberg,  Director,  Computer  Professionals  for  Social


          Responsibility).




          172.  Colvin,  Lock up the Keyboard  Criminal, Telecommunications
                         Lock up the Keyboard  Criminal


          PLC (England), June 1990, p.  38.  Michael Colvin, the  author of


          Great Britain's Computer  Misuse Act stated  that the passage  of


          the bill should not be looked  at that the computer owner  should


          not have security  measures on their computers. Id.  The bill, he
                                                          Id.


          states, was made  only to compliment,  not substitute, the  users


          security  measures.  Id. In  West  Germany, the  severity  of the
                               Id.


          punishment for hacking depends on the effort that was required to


          commit the offense.   Fagan, Technology:  EC urged to  Strengthen
                                       Technology:  EC urged to  Strengthen


          Laws on Computer Crime, The Independent, Feb. 13, 1990, 19.
          Laws on Computer Crime

          173.    McGourty,  When  a  hacker cracks  the  code,  The  Daily
                             When  a  hacker cracks  the  code


          Telegraph, October 22, 1990, p. 31.


          174.  A  Password is a word that  is either given to  the user by


          the  system  or selected  by  the  user  to prevent  others  from


          accessing his  computer  or account  within the  computer.   This


          words,  groups of  letters or  symbols  are supposed  to be  kept


          secret so as  to not let other  who are not authorized  to access


          the system have access to it.




          175. Donn  Seeley, A  Tour  of the  Worm, Department  of Computer
                             _____________________


          Science,  University of  Utah, Nov.  1988,  reprinted in  General
                                                      reprinted in


          Accounting Office, Computer  Security: Virus Highlights  Need for


          Improved Internet Management, 20 (1989).

          176. Authers,  Armed with  a  secret weapon,  Financial  (London)


          Times, Feb. 5, 1991, Section I, 16.

          177.  Id.

          178. For  a discussion  of  this  virus,  see,  Branscomb,  Rogue
                                                    see               Rogue


          Computer  Programs and Computer Rogues:  Tailoring the Punishment
          Computer  Programs and Computer Rogues:  Tailoring the Punishment


          to  Fit the  Crime, 16  Rutgers Computer  &  Tech. L.J.  1, 14-16
          to  Fit the  Crime      _______________________________


          (1990) (discussing the applicability of state and federal  law to


          computer viruses).



          179.   Jim Thomas, publisher  of the Computer  Underground digest


          argues  that computer pirates actually buy more programs then the


          average computer program buyer.   Letter from Jim Thomas to Brian


          J. Peretti (  (discussing computer pirating of software)

          180. See, GNU Manifesto (available at American University Journal


          of International Law and Policy).   See also, Stallman, GNU EMACS
                                              See also,


          General  Public License, (Feb.  11, 1988) (available  at American


          University Journal of International Law and Policy).

          181. The GNU  Manifesto  (available at  the  American  University


          Journal of International Law and Policy).

          182. The  author proposes that such copyright protection last for


          only two years.   By granting the  creator such protection for  a


          short period of  time, he will be  able to  recover  the expenses


          that he put into the writing of the program.


               If   this  type of  protection   is  granted,  it should  be


          understood that the creator of the program has a copyright to the


          sourcecode of the  program for  that period.   If he updates  the


          program  after the  two year  period,  the updated  code will  be


          protected,  but  the  original  code  will  not  be  granted  the
          protection.   In this  manner, an author  cannot attempt  to give


          copyright  protection  to  a  program  after  the  copyright  has


          expired.

          183. Electronic letter from  Brian J. Peretti to  Dorothy Denning


          (Nov. 13, 1990) (concerning computer crime).

          184. This will be a semi-secure system.

          185. The system, of  course, will have a system  manager who will


          create  the accounts  for the  users.   His account  will be  off


          limits  to those who wish  to use the system.   At the same time,


          individuals will  be  encouraged to  attempt  to break  into  the


          manager's  account and  tell  him how  it  was done  in  order to


          improve security for this and other systems.

          186. The problem  still exists  that information  learned through


          the  use of  this system may  allow those  who use the  system to


          break into other computer systems.  This problem can be corrected


          by having the  system manager and the  users communicate problems


          with the system so that they may be corrected on other systems.

          187. United States v. United States Gypsum Co., 438 U.S. 422, 425


          (1978).

          188. S. Rep. No.  432, 99th Cong., 2d Sess. 6,  reprinted in 1986
                                                          reprinted in
          U.S. Code Cong. & Admin. News 2479, 2484.

          189.  Stoll, The Cuckoo's Egg.

          190.  The countries which a person can go to could be any country


          in the  world, except  Albania, since they  are the  only country


          whose computers are not connected to outside computers.  Stoll.

          191. A school in Red Bank, New Jersey, has instituted a "computer


          responsibility training".  Weintraub, Teaching Computer Ethics in
                                                Teaching Computer Ethics in


          the Schools, The School Administrator 8, 9 (apr. 1986).
          the Schools, ________________________

          192. S.  Rep. No. 432, 99th Cong.,  2d Sess. 3, reprinted in 1986
                                                          reprinted in


          U.S. Code Cong. & Admin. News 2479, 2481.

          193. Electronic  Mail Letter  from  Rop  Gonggrijp  to  Brian  J.


          Peretti (Jan. 25, 1991) (concerning computer  viruses).  "We have


          to watch that  we keep telling people how  virusses work, because


          that  is the only solution to the  problem:  mystifying the whole


          thing ans just hunting down "computer  terrorists" is useless and


          (as proven in  the US and Germany) leads to  a questionable style


          of government in the field of information technology..." Id.
                                                                   Id.

          194. General  Accounting   Office,  Computer  Security:     Virus


          Highlights Need for Improved Internet Management, 25 (1989).

MAXIT INTERNET

BLOGGER

CD DVD RW

DELL

DOWNLOAD

FTP Server Linux

HACK

HARD DRIVE

HOW TO WORKIN

HARDWAER

INTERNET

INTERNET CAFE

LAPTOP

LENOVO

LINUX

Additional configuration for Samba Server (Part 2)  

BSNL/Airtel/Idea using Huawei E156G 3g Wireless USB Linux 5   

Basic File Extensions    CHANGING AN ACCOUNT EXPIRATION DATE   

Configure Linux as a Router   

Configure SAMBA Server (Part-1)   

Configure VNC server   

Configure Yum Server (Part-1)   

Configure yum server for Client machine (Part 3)   

Configuring Samba as a Standalone Server (Part 3)  

Connecting ftp Server with Anonymous User Part 5  

Create ftp account with Shared directory Part 3  

DHCP Server Configuration Part 2  

DHCP Server Configuration Part-1  

DHCP Server Configuration Part-3  

Enabling FTP Services in Yum Server (Part 5)  

FTP Server Configuration Part 1  

FTP Server How to Change In Primary DNS Server Part 2  

HTTP Client side configuration (Part 4)  

How to Vsftpd conf files Parameter Part 6   

LINUX FILE SYSTEM STRUCTURE  

Linux User Administrtion  

Linux as a Router configuration for Client Machine   

Linux client machine FileZilla FTP Client Part 4  

Local Yum Server (Part 2)  

Modifying Existing User Information  

Primary DNS Server Configuration Part-1  

Primary DNS Server Configuration Part-2    

Primary DNS Server Configuration Part-3  

Remove Linux From Your Pc Safely and restoring your MBR  

Sharing & Accessing Samba Share (Part 4)   

Speeding up your internet connection under Linux and Windows   

THE ROOT FILE SYSTEM   

VNC Server Configuration

LINUX LAB

Linux as a Router

MOTHERBOARD

Mobile

NETWORKING

REDHAT 5

REGISTRY EDTOR

RESET BIOS PASSWORD

SAMBA Server Linux

SERVER

SERVER CONFIG

SOFTWAER

VNC server Linux

Window 10

Window XP